Select Page
SCCM: Housekeeping Collections

SCCM: Housekeeping Collections

Hi there, I am Matt Balzan and I am a Microsoft PFE with the Windows and Devices team, in the UK. Today I am going to show you how to manage and troubleshoot the collections that are affecting the performance ... continue reading
bake13_0-1583785090535.png

Use SQL Server 2019 PolyBase to Virtualize a Sybase IQ Database

Introduced with SQL Server 2016, the PolyBase feature enabled access to non-relational data stores, namely Hadoop and Azure Blob Storage all while using the familiar and popular Transact-SQL language. SQL Server 2019 builds upon that foundation by unlocking the ability ... continue reading
Wadhrama PARINACOTA attack chain

Human-operated ransomware attacks: A preventable disaster

Human-operated ransomware campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today. In these hands-on-keyboard attacks, which are different from auto-spreading ransomware like WannaCry or NotPetya, adversaries employ credential theft ... continue reading
Take action on your ConfigMgr devices from the Microsoft Endpoint Manager admin center

Take action on your ConfigMgr devices from the Microsoft Endpoint Manager admin center

Microsoft Endpoint Manager is an integrated solution for managing all of your devices. Microsoft brings together Configuration Manager and Intune into a single console called Microsoft Endpoint Manager admin center. Starting in Configuration Manager Technical Preview version 2002.2 you can ... continue reading
Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Initially Isolate Tier 0 Assets with Group Policy to Start Administrative Tiering

Hello everyone, my name is Daniel Metzger and I am a Senior Premier Field Engineer for Secure Infrastructure based in Switzerland. In this post, I am going to show you how to use a minimal set of Group Policy objects ... continue reading
Unifying security policy across all mobile form-factors with Wandera and Microsoft

Unifying security policy across all mobile form-factors with Wandera and Microsoft

The way we work is evolving—technology enables more effective employees by helping them to be productive where and when they choose. Businesses have also been enjoying the productivity benefits of an always-on and always-connected workforce. While new business applications and ... continue reading
1_GPO.jpg

Modern Content Distribution: Microsoft Endpoint Manager and Connected Cache

Hello Everyone! I´m Stefan Röll, Premier Field Engineer (PFE) at Microsoft Germany for Microsoft Endpoint Manager. In this Blog Post I´d like to demonstrate how easy it is to get Microsoft Connected Cache and Delivery Optimization configured in your Configuration ... continue reading
Video Tutorial: BitLocker integration in Configuration Manager current branch

Video Tutorial: BitLocker integration in Configuration Manager current branch

Hello everyone, @Steve Rachui principal field engineer specializing in endpoint management technologies has released a new video tutorial focused on the BitLocker integration added in Configuration Manager version 1910. His discussion and demonstrations walk through the flow of BitLocker policy ... continue reading
Preparing to Deploy Extended Security Updates

Preparing to Deploy Extended Security Updates

Update 02.03.2020: Updated post to confirm that Security Only Quality Updates from November 2019 and onward satisfy the pre-requisites for the ESU key. With the end of support for these Operating Systems on January 14, 2020, many of our customers ... continue reading
Lost in translation – 1910 edition

Lost in translation – 1910 edition

Thank you for your ongoing feedback on our language quality in Configuration Manager current branch. To continue this review process in Configuration Manager current branch 1910 we have uploaded PDF files that contain the new UI changes for Configuration Manager ... continue reading